Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 03:14

General

  • Target

    fe0b99ab0c9407633a96ee5ac25e2ac5505b4dabc597741b12aeea0653feacc5.exe

  • Size

    23KB

  • MD5

    d7f7a907cd1dc1d34695759d4669409b

  • SHA1

    794a8d38ea39cb0245cb06cc95d41ff9f2f9954e

  • SHA256

    fe0b99ab0c9407633a96ee5ac25e2ac5505b4dabc597741b12aeea0653feacc5

  • SHA512

    1506939536d274197aff3ce27ee4a5b9422e37e71e68d7602e23ab69c35a3f8111029f742b64aa46f856a58ef183dae381926883d26eb78f2f6065db774e615b

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe0b99ab0c9407633a96ee5ac25e2ac5505b4dabc597741b12aeea0653feacc5.exe
    "C:\Users\Admin\AppData\Local\Temp\fe0b99ab0c9407633a96ee5ac25e2ac5505b4dabc597741b12aeea0653feacc5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-117-0x0000000000500000-0x00000000005AE000-memory.dmp
    Filesize

    696KB